DP-PSI: Private and Secure Set Intersection

by   Jian Du, et al.

One way to classify private set intersection (PSI) for secure 2-party computation is whether the intersection is (a) revealed to both parties or (b) hidden from both parties while only the computing function of the matched payload is exposed. Both aim to provide cryptographic security while avoiding exposing the unmatched elements of the other. They may, however, be insufficient to achieve security and privacy in one practical scenario: when the intersection is required and the information leaked through the function's output must be considered for legal, ethical, and competitive reasons. Two parties, such as the advertiser and the ads supplier, hold sets of users for PSI computation, for example, to reveal common users to the ads supplier in joint marketing applications. In addition to the security guarantees required by standard PSIs to secure unmatched elements, neither party is allowed to "single out" whether an element/user belongs to the other party or not, even though common users are required for joint advertising. This is a fascinating problem for which none of the PSI techniques have provided a solution. In light of this shortcoming, we compose differential privacy (DP) and S2PC to provide the best of both worlds and propose differentially-private PSI (DP-PSI), a new privacy model that shares PSI's strong security protection while adhering to the GDPR's recent formalization of the notion of excluding "signaling out" attacks by each party except with very low probability.


page 1

page 2

page 3

page 4


Private Membership Aggregation

We consider the problem of private membership aggregation (PMA), in whic...

Accountable Private Set Cardinality for Distributed Measurement

We introduce cryptographic protocols for securely and efficiently comput...

On the security and privacy of Interac e-Transfers

Nowadays, the Interac e-Transfer is one of the most important remote pay...

Reflections on trusting distributed trust

Many systems today distribute trust across multiple parties such that th...

Comprehension from Chaos: What Users Understand and Expect from Private Computation

Private computation, which includes techniques like multi-party computat...

SATE: Robust and Private Allegation Escrows

For fear of retribution, the victim of a crime may be willing to report ...

Privacy-Preserving Link Prediction

Consider two data holders, ABC and XYZ, with graph data (e.g., social ne...

Please sign up or login with your details

Forgot password? Click here to reset